Skip to content

Commit f87bb4f

Browse files
authored
Merge pull request #22161 from MikeRayMSFT/20220520-copy-into
Update for parquet files
2 parents be923ca + c6dcc8b commit f87bb4f

4 files changed

Lines changed: 13 additions & 5 deletions

File tree

azure-sql/database/firewall-configure.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,13 @@ Connection attempts from the internet and Azure must pass through the firewall b
3131

3232
### Server-level IP firewall rules
3333

34-
These rules enable clients to access your entire server, that is, all the databases managed by the server. The rules are stored in the *master* database. You can have a maximum of 128 server-level IP firewall rules for a server. If you have the **Allow Azure Services and resources to access this server** setting enabled, this counts as a single firewall rule for the server.
34+
These rules enable clients to access your entire server, that is, all the databases managed by the server. The rules are stored in the *master* database. The default value is up to 256 server-level IP firewall rules for a server. If you have the **Allow Azure Services and resources to access this server** setting enabled, this counts as a single firewall rule for the server.
3535

3636
You can configure server-level IP firewall rules by using the Azure portal, PowerShell, or Transact-SQL statements.
3737

38+
> [!NOTE]
39+
> The maximum number of server-level IP firewall rules is limited to 128 when configuring using the Azure portal.
40+
3841
- To use the portal or PowerShell, you must be the subscription owner or a subscription contributor.
3942
- To use Transact-SQL, you must connect to the *master* database as the server-level principal login or as the Azure Active Directory administrator. (A server-level IP firewall rule must first be created by a user who has Azure-level permissions.)
4043

@@ -47,7 +50,7 @@ Database-level IP firewall rules enable clients to access certain (secure) datab
4750

4851
- You can only create and manage database-level IP firewall rules for master and user databases by using Transact-SQL statements and only after you configure the first server-level firewall.
4952
- If you specify an IP address range in the database-level IP firewall rule that's outside the range in the server-level IP firewall rule, only those clients that have IP addresses in the database-level range can access the database.
50-
- You can have a maximum of 128 database-level IP firewall rules for a database. For more information about configuring database-level IP firewall rules, see the example later in this article and see [sp_set_database_firewall_rule (Azure SQL Database)](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database).
53+
- The default value is up to 256 database-level IP firewall rules for a database. For more information about configuring database-level IP firewall rules, see the example later in this article and see [sp_set_database_firewall_rule (Azure SQL Database)](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database).
5154

5255
### Recommendations for how to set firewall rules
5356

docs/integration-services/devops/ssis-devops-standalone.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ SSISBuild.exe -project|-p:<dtproj file path> [-configuration|-c:<configuration n
7373
SSISBuild.exe -p:C:\projects\demo\demo.dtproj -c:DevConfiguration -pp:encryptionpassword -o:D:\folder
7474
```
7575
76-
- Build a dtproj with configuration "DevConfiguration", encrypted with password, striping its sensitive data, and log level DIAG:
76+
- Build a dtproj with configuration "DevConfiguration", encrypted with password, stripping its sensitive data, and log level DIAG:
7777
```
7878
SSISBuild.exe -p:C:\projects\demo\demo.dtproj -c:DevConfiguration -pp:encryptionpassword -ss -l:diag
7979
```

docs/t-sql/functions/json-modify-transact-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ PRINT @info
271271
"skills": ["C#", "SQL"]
272272
} {
273273
"name": "John",
274-
"skills": ["C#", "T-SQL", "Azure"]
274+
"skills": "[\"C#\",\"T-SQL\",\"Azure\"]"
275275
}
276276
```
277277

docs/t-sql/statements/copy-into-transact-sql.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -274,14 +274,19 @@ IDENTITY_INSERT specifies whether the identity value or values in the imported d
274274
- IDENTITY_INSERT can only be set for one table at a time.
275275

276276
#### *AUTO_CREATE_TABLE = { 'ON' | 'OFF' }*
277-
*AUTO_CREATE_TABLE* specifies if the table could be automatically created by working alongside with automatic schema discovery.
277+
278+
*AUTO_CREATE_TABLE* specifies if the table could be automatically created by working alongside with automatic schema discovery. It is available only for parquet files.
278279

279280
- ON: Enables automatic table creation. The COPY INTO process will create a new table automatically by discovering the structure of the file to be loaded.
280281
- OFF: Automatic table creation is not enabled. Default.
281282

282283
>[!NOTE]
283284
> The automatic table creation works alongside with automatic schema discovery. The automatic table creation is NOT enabled by default.
284285
286+
Do not load into hash distributed tables from parquet files using COPY INTO with AUTO_CREATE_TABLE = 'ON'.
287+
288+
If parquet files are to be loaded into hash distributed tables using COPY INTO, load it into a round robin staging table followed by INSERT ... SELECT from that table to the target hash distributed table.
289+
285290
### Permissions
286291

287292
The user executing the COPY command must have the following permissions:

0 commit comments

Comments
 (0)